A persistent cross-site scripting (XSS) vulnerability in the Snort Rules configuration of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0834 | A persistent cross-site scripting (XSS) vulnerability in the Snort Rules configuration of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3. |
Fixes
Solution
The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases.
Workaround
There are no known workarounds for this issue, however limit the access to only trusted administrators from trusted administrative networks or hosts would minimize the risk.
References
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA10918 |
|
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-17T00:21:24.078Z
Reserved: 2018-10-11T00:00:00
Link: CVE-2019-0027
No data.
Status : Modified
Published: 2019-01-15T21:29:01.917
Modified: 2024-11-21T04:16:04.823
Link: CVE-2019-0027
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD